Search
Now showing items 1-10 of 12
Enhanced Information Security Model Using Integrated Approach for Saccos in Kenya
(JOOUST, 2020)
Information systems security is a very important aspect for the performance and sustainability of SACCOS. A secure information systems security plays a significant role of keeping all the SACCOS information from being ...
Pseudo-Stochastic Mobility Tracking Protocol for Secure and High Performance Handovers in 5g and Beyond Networks
(JOOUST, 2022-03)
The goal of this thesis was to develop a pseudo-stochastic mobility tracking protocol for secure and high performance handovers in 5G and beyond networks. The research specifically assessed current user equipment mobility ...
A Participatory Model for an Enhanced Adoption of ICT Innovations by Smallholder Farmers
(JOOUST, 2022)
Agriculture has been identified as the main source of livelihood for a large population in Africa, with over 80% of farmers being smallholder farmers. However, despite a large group of smallholder farmers being involved ...
Factors That Influence Cybersecurity Compliance Behaviours by Bank Employees: A Case of Banks Operating in Kenya
(JOOUST, 2022)
Digitization of transanctions in Banks has developed exponentially since the advent of the internet technology. This has brought about efficiency and high quality service delivery at all times. However, cyber threats also ...
An Optimized Artificial Intelligence Model for Emergency Case Response in Healthcare
(JOOUST, 2022)
Artificial intelligence (AI), which is already being used in healthcare, has brought a paradigm shift to the field. Owing to the growing availability of healthcare data, there has been rapid advancement in the use of ...
Extended Acceptance and Use of Information Technology Model: Assessing Integrated Financial Management Information Systems in the Public Sector
(JOOUST, 2017)
Integrated Financial Management informtion Systems as a system is globally considered as a con¬tributing factor significantly towards the improvement of financial management in the broader government sectors, it has such ...
The Contextualization of Structuration Theory in Electronic Government in Enhancing Governance in Two County Governments in Kenya
(JOOUST, 2018)
Today, the Kenyan government is investing and has endeavored to embrace electronic government (e-government) in almost all ministries to pave way for speedy service delivery, enhance transparency and accountability. However, ...
Towards Modeling and Building E-Agriculture Framework in Kenya
(JOOUST, 2015)
Sustainable poverty reduction in developing nations, such as Kenya, is only achievable through economic growth and development strategies where agriculture is considered as a key driver. This is because agriculture contributes ...
E-Commerce Adoption in Publishing Industry
(JOOUST, 2018-03)
E-Commerce (electronic commerce or EC) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the Internet through which transactions or terms of sale ...
Addition-composition Fully Homomorphic Encryption sheme and its Enhancement of Data Security in Cloud Computing
(JOOUST, 2019)
Cloud computing is a technological paradigm that enables computer users to access computing applications and services on a pay-as-you-use model. Over the years, the adoption of cloud computing by cloud service providers ...